General

  • Target

    logger.exe

  • Size

    659KB

  • MD5

    60ebe2937796ecd5c14c4bbb1663de20

  • SHA1

    1696ee15de1667bb58e46838446aca457ac5c48c

  • SHA256

    22a3fd6f009576f4ef519c5cd268134fd25dcb642406509762e36c08f5265d5f

  • SHA512

    129cc6e686a12ed20a9968acd05bc7f0da5c6e55b31a41f70e1b3351af43c1e879ba0a6c766e456bdf2d44cfc11ecf3774dafd351d6e8214cae6ca24e6c82d0f

  • SSDEEP

    12288:G9HFJ9rJxRX1uVVjoaWSoynxdO1FVBaOiRZTERfIhNkNCCLo9Ek5C/hv:iZ1xuVVjfFoynPaVBUR8f+kN10EBV

Score
10/10

Malware Config

Extracted

Family

darkcomet

C2

snowy.ddns.net:80

Mutex

DC_MUTEX-ANWWFCY

Attributes
  • InstallPath

    \CloudService\cloud.exe

  • gencode

    02Yt75CfAaPW

  • install

    true

  • offline_keylogger

    true

  • persistence

    true

  • reg_key

    MicroUpdate

Signatures

  • Darkcomet family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • logger.exe
    .exe windows:4 windows x86

    e5b4359a3773764a372173074ae9b6bd


    Headers

    Imports

    Sections